If one's connection is corrupted when your guard and exit node is the same person (that can then analyze your traffic and based on that figure out your IP), why does Tor allow them to be from the same ...

Immediately after downloading the Tor browser I went to the options page and saw that the 'Block dangerous and deceptive content' box under 'Deceptive Content and Dangerous Software Protection' was ...

I was browsing with TOR and I had a second USB drive plugged into the computer, I have previously saved data to that drive in other sessions but I did not write anything to the second USB during the ...

I am on Windows 10 with TBB version 8.0.8. I extracted the bundle to my desktop and used it form there for some time (Computer A). Of note, I created some bookmarks. I then moved the TBB folder to a ...

My Orbot App Stopped is Bootleg even though it was 100%. After it shit down it said " Definitely Not The Fbi" What Does this mean? Im assuming a warning. I Shut the process down. Cleared data and cut ...

I have heard that Tor protects users from sites that try to fingerprint browsing history with its integration of NoScript. But it's not completely secure as some researchers claims.
Does Tor really ...

Is there anyway to use tor network to securely access me email accounts like with onion?
I use tor browser to access my email account and sent my self an email to another email service and it showed ...

I have used messages.android.com on Tor for a long time. Recently though after navigating to the website, a permission request popped up. Having never seen it before, I declined the permission. From ...

Let's suppose my goal is to prevent someone from tampering with my TAILS session while I'm absent from my laptop, and let's suppose that shutting down every time I go for a walk isn't an option.
The ...

Mozilla Firefox has added the ability to use Trusted Recursive Resolver within Firefox. This means that it's now possible to route DNS queries over HTTPS without additional software. It was included ...

Say I'm using Tor, and I make an error by, for example, logging into an account on a website. Will this deanonymization only affect my current session, since I can just restart my browser and get a ...

What if i run a relay and a person downloads illegal content? Example: Like child porn that goes past my relay? In general speaking i am just as bad as the person that downloads such content. So even ...

I am curious how I can rely on Tor network in terms of traceability.
I am looking for really professional who can say if my Tor communication is secure, if a Tor exit node is detectable or traceable....

I'm writing a novel, and one of my characters is into some illegal activities on the web. He's ultra-paranoid about security, so uses Tor...but he doesn't want anyone who might snoop in his computer ...

So I was curious. I was reading up on the dark net market the silk road and it mentioned that the “owner” always used Tor through public wifi. Is there any particular benefit from doing that, or was ...

I use the Tor Browser to access the internet, but when I log into my Facebook account it has been locked and shows a security message from Facebook informing me that someone has tried to log into my ...